½ÃÀ庸°í¼­
»óǰÄÚµå
1319201

¼¼°èÀÇ Â÷¼¼´ë ¹æÈ­º® - ¿¹Ãø(-2027³â)

Global Next-generation Firewall-Forecast to 2027

¹ßÇàÀÏ: | ¸®¼­Ä¡»ç: Frost & Sullivan | ÆäÀÌÁö Á¤º¸: ¿µ¹® 85 Pages | ¹è¼Û¾È³» : 1-2ÀÏ (¿µ¾÷ÀÏ ±âÁØ)

    
    
    



¡Ø º» »óǰÀº ¿µ¹® ÀÚ·á·Î Çѱ۰ú ¿µ¹® ¸ñÂ÷¿¡ ºÒÀÏÄ¡ÇÏ´Â ³»¿ëÀÌ ÀÖÀ» °æ¿ì ¿µ¹®À» ¿ì¼±ÇÕ´Ï´Ù. Á¤È®ÇÑ °ËÅ並 À§ÇØ ¿µ¹® ¸ñÂ÷¸¦ Âü°íÇØÁֽñ⠹ٶø´Ï´Ù.

Ŭ¶ó¿ìµå µµÀÔÀÌ ¼¼°è NGFWÀÇ ¹Ì·¡ ¼ºÀ强À» Á¿ì

Â÷¼¼´ë ¹æÈ­º®(NGFW)Àº ±âÁ¸ ¹æÈ­º®°ú ¸¶Âù°¡Áö·Î ¹Ì¸® Á¤ÇØÁø º¸¾È ±ÔÄ¢¿¡ µû¶ó ³×Æ®¿öÅ© Æ®·¡ÇÈÀ» ÇÊÅ͸µÇÏÁö¸¸, ¾ÖÇø®ÄÉÀÌ¼Ç °èÃþ¿¡ ´ëÇÑ ¼¼ºÎÀûÀÎ °¡½Ã¼º°ú Á¦¾î ±â´ÉÀ» Æ÷ÇÔÇϵµ·Ï ÁøÈ­Çϰí ÀÖ½À´Ï´Ù. µ¥ÀÌÅÍ Æ®·¡ÇÈÀ» º¸´Ù ½ÉÃþÀûÀ¸·Î Á¶»çÇÒ ¼ö ÀÖ°Ô µÇ¾ú½À´Ï´Ù. Ŭ¶ó¿ìµå ÄÄÇ»ÆÃ, »ç¹°ÀÎÅͳÝ(IoT) ±â±â, ¿ø°Ý ±Ù¹«°¡ È®´ëµÇ¸é¼­ Á¶Á÷ÀÇ ÀüÅëÀûÀÎ º¸¾È °æ°è°¡ Á¡Â÷ Çã¹°¾îÁö°í ÀÖ´Â °¡¿îµ¥, ÇÏÀ̺긮µå IT ȯ°æÀ» µµÀÔÇÏ´Â ±â¾÷ÀÌ ´Ã°í ÀÖ½À´Ï´Ù. Ŭ¶ó¿ìµå ÄÄÇ»ÆÃÀº È®À强, À¯¿¬¼º µî ´Ù¾çÇÑ ÀÌÁ¡À» Á¦°øÇÏ´Â ¹Ý¸é, °íÀ¯ÇÑ °úÁ¦¿Í º¸¾È À§ÇùÀ» ¼ö¹ÝÇÕ´Ï´Ù.

Â÷¼¼´ë »çÀ̹ö º¸¾È °ø°ÝÀº ´Ù¸éÀûÀÎ Á¢±Ù ¹æ½ÄÀ» Æ÷ÇÔÇÏ¸ç µ¿½Ã¿¡ ¿©·¯ °¡Áö º¤ÅÍ¿¡¼­ Á¶Á÷À» °ø°ÝÇÏ´Â °ÍÀ¸·Î, NGFW´Â ¸¹Àº Á¶Á÷¿¡ ÇʼöÀûÀÎ µµ±¸°¡ µÇ¾úÁö¸¸, ¿À´Ã³¯ÀÇ ÇÏÀ̺긮µå IT ÀÎÇÁ¶ó¸¦ È¿°úÀûÀ¸·Î º¸È£ÇÒ ¼ö ÀÖ´Â °¡½Ã¼º°ú À¯¿¬¼ºÀÌ ºÎÁ·Çϱ⠶§¹®¿¡ ¿À´Ã³¯ÀÇ À§Çù »óȲ¿¡¼­ ´õ ÀÌ»ó ÃæºÐÇÏÁö ¾Ê½À´Ï´Ù. ÇÏÀ̺긮µå ȯ°æÀº ITÀÇ º¹À⼺À» Áõ°¡½ÃÄÑ Á¦·Î Æ®·¯½ºÆ®¿Í SASE(Secure Access Service Edge) º¸¾È ¿øÄ¢À» Æ÷ÇÔÇÑ º¸´Ù Á¾ÇÕÀûÀÎ ¼Ö·ç¼ÇÀ» ÇÊ¿ä·Î ÇÕ´Ï´Ù. ÀÌ´Â NGFW°¡ ±¸½ÄÀ̶ó´Â °ÍÀ» ÀǹÌÇÏ´Â °ÍÀÌ ¾Æ´Ï¶ó, ´õ ¸¹Àº Á¶Á÷ÀÌ º¸´Ù Á¾ÇÕÀûÀÎ Ç÷§Æû Á¦°øÀÇ ¿ì»ê ¾Æ·¡ NGFW ¼­ºñ½º¿¡ °¡ÀÔÇÏ´Â ±¸¸Å ÇൿÀÇ º¯È­¸¦ °¡Á®¿Ã »ÓÀÔ´Ï´Ù.

¼ö¿äÀÇ º¯È­¿Í ÁøÈ­ÇÏ´Â À§Çù ȯ°æÀ¸·Î ÀÎÇØ ´ëºÎºÐÀÇ NGFW º¥´õµéÀº ³×Æ®¿öÅ©¿Í º¸¾È ±â´ÉÀ» ÅëÇÕÇϰí Ŭ¶ó¿ìµå Àüȯ °úÁ¤¿¡¼­ °í°´À» º¸È£Çϱâ À§ÇØ ÇÏÀ̺긮µå Á¦Ç°À» Æ÷ÇÔÇÑ Á¦Ç° Æ÷Æ®Æú¸®¿À¸¦ È®ÀåÇϰí ÀÖ½À´Ï´Ù. ¼ø¼ö NGFW¿¡¼­ SASE ¼Ö·ç¼ÇÀ¸·Î ÀüȯÇÏ´Â º¥´õ°¡ ´Ã¾î³ª¸é¼­ ½ÃÀåÀº ºü¸¥ ¼ºÀå·ü·Î Á¦2ÀÇ ¸£³×»ó½º¸¦ °æÇèÇϰí ÀÖ½À´Ï´Ù. ½Ã°£ÀÌ Áö³²¿¡ µû¶ó ´õ ¸¹Àº Á¶Á÷ÀÌ Çϵå¿þ¾î¿¡¼­ °¡»ó ¹æÈ­º® ¶Ç´Â Ŭ¶ó¿ìµå ¹æÈ­º®(¼­ºñ½ºÇü ¹æÈ­º®À̶ó°íµµ ÇÔ)À¸·Î ÀüȯÇϰí ÀÖÀ¸¸ç, NGFW °ø±Þ¾÷ü´Â ´õ Å« SASE ¹øµéÀÇ ÀϺηΠƯÁ¤ Áö¿ª¿¡¼­ ´Ù¾çÇÑ ÆûÆÑÅ͸¦ ÆÇ¸ÅÇϱ⠽ÃÀÛÇß½À´Ï´Ù. Ŭ¶ó¿ìµå µµÀÔ·üÀÌ ³ôÀº ºÏ¹Ì¿Í À¯·´, Áßµ¿ ¹× ¾ÆÇÁ¸®Ä«¿¡¼­ ¼­ºñ½ºÇü ¹æÈ­º®(FWaaS) ¼Ö·ç¼Ç¿¡ ´ëÇÑ ¼ö¿ä°¡ °¡Àå ³ôÀ» °ÍÀ¸·Î ¿¹»óµË´Ï´Ù. µ¿½Ã¿¡ APACÀº ¿ÂÇÁ·¹¹Ì½º IT ÀÎÇÁ¶ó°¡ ÁýÁߵǾî Àֱ⠶§¹®¿¡ Çϵå¿þ¾î NGFW ¼Ö·ç¼ÇÀÇ ¾ÈÁ¤ÀûÀÎ ¼öÀÍ¿øÀÌ µÉ °ÍÀ¸·Î º¸ÀÔ´Ï´Ù.

¸ñÂ÷

Àü·«Àû °úÁ¦

  • ¿Ö ¼ºÀåÀÌ ¾î·Á¿öÁö°í Àִ°¡?
  • The Strategic Imperative 8(TM)
  • Â÷¼¼´ë ¹æÈ­º® ¾÷°èÀÇ Àü·«Àû Áß¿ä °úÁ¦ ž 3ÀÇ ¿µÇâ
  • ¼ºÀå ±âȸ°¡ Growth Pipeline Engine(TM)À» ÃËÁøÇÑ´Ù

¼ºÀå ±âȸ ºÐ¼®

  • ºÐ¼® ¹üÀ§
  • ¼¼ºÐÈ­
  • ÁÖ¿ä º¥´õ
  • ¼ºÀå ÁöÇ¥
  • À¯Åë ä³Î
  • ¼ºÀå ÃËÁø¿äÀÎ
  • ¼ºÀå ÃËÁø¿äÀÎ ºÐ¼®
  • ¼ºÀå ÀúÇØ¿äÀÎ
  • ¼ºÀå ÀúÇØ¿äÀÎ ºÐ¼®
  • ¿¹Ãø °¡Á¤
  • ¸ÅÃâ ¿¹Ãø
  • Á¦Ç°º° ¸ÅÃâ ¿¹Ãø
  • Áö¿ªº° ¸ÅÃâ ¿¹Ãø
  • ¾÷°èº° ¸ÅÃâ ¿¹Ãø
  • »ç¾÷ ±Ô¸ðº° ¸ÅÃâ ¿¹Ãø
  • ¸ÅÃâ°ú ¿¹Ãø ºÐ¼®
  • °¡°Ý µ¿Çâ°ú ¿¹Ãø ºÐ¼®
  • °æÀï ȯ°æ
  • ¸ÅÃâ Á¡À¯À²
  • ¸ÅÃâ Á¡À¯À² ºÐ¼®

¼ºÀå ±âȸ ºÐ¼® - ºÏ¹Ì

  • ¼ºÀå ÁöÇ¥
  • ¸ÅÃâ ¿¹Ãø
  • Á¦Ç°º° ¸ÅÃâ ¿¹Ãø
  • ¾÷°èº° ¸ÅÃâ ¿¹Ãø
  • »ç¾÷ ±Ô¸ðº° ¸ÅÃâ ¿¹Ãø
  • Áö¿ªº° ¿¹Ãø ºÐ¼®

¼ºÀå ±âȸ ºÐ¼® - ¶óƾ¾Æ¸Þ¸®Ä«

  • ¼ºÀå ÁöÇ¥
  • ¸ÅÃâ ¿¹Ãø
  • Á¦Ç°º° ¸ÅÃâ ¿¹Ãø
  • ¾÷°èº° ¸ÅÃâ ¿¹Ãø
  • »ç¾÷ ±Ô¸ðº° ¸ÅÃâ ¿¹Ãø
  • Áö¿ªº° ¿¹Ãø ºÐ¼®

¼ºÀå ±âȸ ºÐ¼® - À¯·´, Áßµ¿ ¹× ¾ÆÇÁ¸®Ä«

  • ¼ºÀå ÁöÇ¥
  • ¸ÅÃâ ¿¹Ãø
  • Á¦Ç°º° ¸ÅÃâ ¿¹Ãø
  • ¾÷°èº° ¸ÅÃâ ¿¹Ãø
  • »ç¾÷ ±Ô¸ðº° ¸ÅÃâ ¿¹Ãø
  • Áö¿ªº° ¿¹Ãø ºÐ¼®

¼ºÀå ±âȸ ºÐ¼® - ¾Æ½Ã¾ÆÅÂÆò¾ç

  • ¼ºÀå ÁöÇ¥
  • ¸ÅÃâ ¿¹Ãø
  • Á¦Ç°º° ¸ÅÃâ ¿¹Ãø
  • ¾÷°èº° ¸ÅÃâ ¿¹Ãø
  • »ç¾÷ ±Ô¸ðº° ¸ÅÃâ ¿¹Ãø
  • Áö¿ªº° ¿¹Ãø ºÐ¼®

CISO¿ë ÀλçÀÌÆ®

  • °³¿ä
  • NGFW °³¿ä
  • °í·ÁÇØ¾ß ÇÒ ÁÖ¿ä µµÀÔ ¿äÀÎ
  • °í·ÁÇØ¾ß ÇÒ ÁÖ¿ä µµÀÔ ¿äÀÎ
  • ¿äÁ¡

¼ºÀå ±âȸ À¯´Ï¹ö½º

  • ¼ºÀå ±âȸ 1 : LATAM ½ÃÀå¿¡ ´ëÇÑ ÁøÃâ
  • ¼ºÀå ±âȸ 2 : ÇÏÀ̺긮µå º¸¾È Á¦°ø
  • ¼ºÀå ±âȸ 3 : AI ÅëÇÕ

´ÙÀ½ ½ºÅÜ

  • ´ÙÀ½ ½ºÅÜ
  • ¿Ö Áö±Ý ÇÁ·Î½ºÆ®Àΰ¡?
  • º°Áö ¸®½ºÆ®
  • ¸éÃ¥»çÇ×
ksm 23.08.22

Cloud Adoption Dictates Future Growth Potential of Global NGFW

Much like conventional firewalls, next-generation firewalls (NGFWs) filter network traffic based on predetermined security rules but have evolved to include granular application-layer visibility and control capabilities, enabling organizations to examine data traffic more deeply. With the traditional security perimeter of organizations slowly disappearing due to the growing utilization of cloud computing, Internet of Things (IoT) devices, and remote work, more businesses are implementing hybrid IT environments. While cloud computing offers various benefits, such as scalability and flexibility, it comes with its own set of challenges and security threats.

The new generation of cybersecurity attacks involves a multifaceted approach, simultaneously striking an organization from multiple vectors. NGFWs have become an essential tool for many organizations; however, they no longer suffice in today's threat landscape due to a lack of visibility and flexibility to effectively secure modern hybrid IT infrastructures. Hybrid environments present higher IT complexity and require more comprehensive solutions, which include zero trust and secure access service edge (SASE) security principles. This does not imply that NGFWs are obsolete; it simply creates a shift in purchasing behavior, in which more organizations subscribe to NGFW services under the umbrella of a more holistic platform offering.

Due to the shift in demand and the evolving threat landscape, most NGFW vendors have expanded their product portfolio to include hybrid offerings, fusing network and security capabilities to protect customers throughout their cloud migration journey. With more vendors transitioning from pure-play NGFW to SASE solutions, the market is experiencing a second renaissance with accelerated growth rates. As time progresses, more organizations will shift from hardware to virtual and cloud firewalls (also called firewall-as-a-service) as part of a larger SASE bundle, leading NGFW vendors to market different form factors in specific regions. Due to the higher rate of cloud adoption, demand for firewall-as-a-service (FWaaS) solutions will be highest in North America and EMEA. At the same time, APAC will remain a steady source of revenue for hardware NGFW solutions due to the higher concentrations of on-premises IT infrastructures.

Table of Contents

Strategic Imperatives

  • Why is it Increasingly Difficult to Grow?
  • The Strategic Imperative 8™
  • The Impact of the Top 3 Strategic Imperatives on the Next-generation Firewall Industry
  • Growth Opportunities Fuel the Growth Pipeline Engine™

Growth Opportunity Analysis

  • Scope of Analysis
  • Segmentation
  • Key Vendors
  • Growth Metrics
  • Distribution Channels
  • Growth Drivers
  • Growth Driver Analysis
  • Growth Restraints
  • Growth Restraint Analysis
  • Forecast Assumptions
  • Revenue Forecast
  • Revenue Forecast by Product
  • Revenue Forecast by Region
  • Revenue Forecast by Industry Vertical
  • Revenue Forecast by Business Size
  • Revenue Forecast Analysis
  • Pricing Trends and Forecast Analysis
  • Competitive Environment
  • Revenue Share
  • Revenue Share Analysis

Growth Opportunity Analysis-North America

  • Growth Metrics
  • Revenue Forecast
  • Revenue Forecast by Product
  • Revenue Forecast by Industry Vertical
  • Revenue Forecast by Business Size
  • Forecast Analysis by Region

Growth Opportunity Analysis-Latin America

  • Growth Metrics
  • Revenue Forecast
  • Revenue Forecast by Product
  • Revenue Forecast by Industry Vertical
  • Revenue Forecast by Business Size
  • Forecast Analysis by Region

Growth Opportunity Analysis-Europe, The Middle East, and Africa

  • Growth Metrics
  • Revenue Forecast
  • Revenue Forecast by Product
  • Revenue Forecast by Industry Vertical
  • Revenue Forecast by Business Size
  • Forecast Analysis by Region

Growth Opportunity Analysis-Asia-Pacific

  • Growth Metrics
  • Revenue Forecast
  • Revenue Forecast by Product
  • Revenue Forecast by Industry Vertical
  • Revenue Forecast by Business Size
  • Forecast Analysis by Region

Insights for CISOs

  • Overview
  • Making Heads or Tails of NGFW
  • Top Deployment Factors to Consider
  • Top Deployment Factors to Consider
  • The Bottom Line

Growth Opportunity Universe

  • Growth Opportunity 1: Expansion into the LATAM Market
  • Growth Opportunity 2: Hybrid Security Offerings
  • Growth Opportunity 3: AI Integration

Next Steps

  • Your Next Steps
  • Why Frost, Why Now?
  • List of Exhibits
  • Legal Disclaimer
ºñ±³¸®½ºÆ®
0 °ÇÀÇ »óǰÀ» ¼±Åà Áß
»óǰ ºñ±³Çϱâ
Àüü»èÁ¦